- M3AAWG Messaging playlist on YouTube
- Selected Training Videos (also available on www.youtube.com/maawg)
- Selected Keynote Videos (also available on www.youtube.com/maawg)
Below are the M3AAWG published materials related to our messaging anti-abuse work. There is also a Messaging video playlist on our YouTube channel at www.youtube.com/maawg and there are a few selected videos on our website in the Training Videos and Keynotes Videos sections under the Meetings menu tab.
Best Practices
M3AAWG Position on Email Appending, Version 1.0.1
In marketing terms, “appending” – also known as "e-appending" or "e-pending" – is the practice of taking demographic information known (or assumed) to be related to a particular customer and matching it with other data. It is the position of M3AAWG that this is an abusive messaging practice. The January 2019 Version 1.0.1 is updated to include the European Union's GDPR and CASL.
M3AAWG Best Current Practices for Reporting Phishing URLs
Phishing continues to be a significant problem for hosting companies, mailbox providers, brand owners and, of course, for every internet user. This document iinforms all of these groups on the best current practices for reporting phishing URLs.
A M3AAWG Introduction to Addressing Malicious Domain Registrations
This document focuses on defining malicious domain names and provides a non-exhaustive list of possible actions that can be taken to address them.
M3AAWG Recommendations: Methods for Sharing Dynamic IP Address Space Information with Others-Updated May 2018 (2008)
Although M3AAWG recommends blocking outbound port 25 traffic as the best option for controlling the flow of unwanted email traffic from an ISP’s customer space, such blocks may not always be possible, either for the short or long term. This document offers some alternatives for these ISPs by describing methods they can use to share their dynamic space information with others and allow remote sites to reject inbound mail traffic from dynamic address space.
M3AAWG Compromised User ID Best Practices, Version 1.0.1
Updated in March 2018, this document addresses problems associated with compromised user accounts. It discusses mitigation techniques and methods of identifying compromised accounts, including recommendations to ensure the long-term security of accounts to prevent “re-compromise.”
Pages
Public Policy Comments
Comments on Implementation of CSRIC III Cybersecurity Best Practices
M3AAWG submitted these comments with the new M3AAWG Bot Metrics Report in response to the U.S, Federal Communications Communications request for comments on the status of the implementation of CSRIC III best practices.
Additional Responses from Dr. Paul Vixie to the U.S. Senate Hearing on "Taking Down Botnets: Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks"
Dr. Vixie's August 4th written response to additional questions requested after the hearing on botnet takedowns is also available from the official U.S. Committee on the Judiciary Committee hearing website at
www.judiciary.senate.gov/download/vixie-qfrs-71514 .
M3AAWG Comments on ICANN Misuse Report
Submitted to ICANN in December 2013 in response to ICANN's misuse survey.
M3AAWG Comments on ICANN EWG Initial Report
Submitted to ICANN in August 2013 in response to ICANN's Expert Working Group report.
M3AAWG Response to CWG-Internet Request for Online Consultation-Combatting Spam
Submitted to the ITU Council Working Group on International Internet–Related Public Policy Issues (CWG–Internet) in July 2013
In response to a request for comments on effectively countering and combatting spam.
Pages
M3AAWG Reports
DM3Z Blog
Updates and Commentary from the Messaging, Malware and Mobile Anti-Abuse Working Group
None at this time.
News
News Releases
Latin American and Caribbean Anti-Abuse Working Group to Collaborate with LACNIC and M3AAWG to Fight Online Threats
M3AAWG Issues New Papers Explaining Password Security, Multifactor Authentication, Encryption Use and DDoS Safeguards; Announces 2017 Leadership and Committee Chairs
André Leduc Receives M3AAWG 2016 JD Falk Award for Operation Safety-Net and CASL Work that Protects Online Users
Pages
Articles About M3AAWG
Policy eliminates pre-emptive protection of internet infrastructure abuse
Networks Asia - Security Asia
https://www.networksasia.net/article/policy-eliminates-pre-emptive-prote...
A joint APWG-M3AAWG survey of cybercrime responders and anti-abuse personnel indicates ICANN’s Temporary Specification for domain name WHOIS data has eliminated interventions that previously allowed investigators to stop new cybercrimes while still in the preparatory stages -- and has markedly impeded routine mitigations for many kinds of cybercrimes.
How Do You Fight a $12B Fraud Problem? One Scammer at a Time
https://krebsonsecurity.com/2018/10/how-do-you-fight-a-12b-fraud-problem...
Brian Krebs interviewed Ronnie Tokazowski, founder of the private BEC List that received the 2018 JD Falk Award, on Business Email Compromise and the list's cooperative fight to protect end-users.
Group recognized for efforts thwart Nigerian email scams
https://thehill.com/policy/cybersecurity/410603-private-group-recognized...
Coverage of the BEC List fighting online fraud and the M3AAWG 2018 JD Falk Award it received.
The History of Email with Dave Crocker, Part 2
https://thenetworkcollective.com/2018/06/hon-email-part-2/
In 1990, an unresolvable debate over how to expand email beyond ASCII text spawned two separate working groups and is a rare example of how staunchly competitive tech groups unintentionally ended up collaborating to create something important that went beyond the original objective. The result: multimedia email, according to M3AAWG Senior Technical Advisor Dave Crocker in part 2 of his Network Collective podcast on the history of email.
Hackers Shut Down ProPublica’s Email For a Day. Here’s How to Stop Attacks Like That.
ProPublica's Julia Angwin augments her earlier "list bomb" article with information on what can be done to prevent these attacks.
Pages
Videos
